Bra podd
Topplistor
Barn och familj
Fritid
Hälsa och motion
Historia
Komedi
Konst och kultur
Musik
Näringsliv
Nyheter och politik
Poddtoppen
Religion och spiritualitet
Samhälle och kultur
Skönlitteratur
Sport och fritid
Stat och kommun
Teknik
Tv och film
Utbildning
Verkliga brott
Vetenskap
Kategorier
Konst
(1445)
Religion och spiritualitet
(1401)
Utbildning
(1311)
Samhälle och kultur
(1254)
Fritid
(1061)
Musik
(1028)
Teknologi
(1028)
Vetenskap
(937)
TV och film
(919)
Nyheter
(860)
Historia
(834)
Hälsa och motion
(729)
Näringsliv
(733)
Barn och familj
(703)
Skönlitteratur
(676)
Kristendom
(515)
Komedi
(482)
Böcker
(470)
Verkliga brott
(415)
Sport
(422)
Stat och kommun
(383)
Andlighet
(394)
Självhjälp
(371)
Sällskapsspel
(275)
Drama
(269)
Hobbies
(270)
Mental hälsa
(260)
Musikkommentarer
(247)
Musikintervjuer
(237)
Spel
(224)
Föräldraskap
(221)
Dokumentär
(208)
Politik
(212)
Språkkurs
(201)
Samhällsvetenskap
(182)
Science fiction
(179)
Mat
(148)
Tekniknyheter
(152)
Entreprenörskap
(150)
Filmrecensioner
(148)
Dans och teater
(147)
Islam
(147)
Så gör man
(138)
Investering
(133)
TV-recensioner
(132)
Mode och skönhet
(128)
Efterprogram
(126)
Personliga dagböcker
(125)
Musikhistoria
(129)
Visuell konst
(129)
Relationer
(123)
Berättelser för barn
(116)
Design
(113)
Naturvetenskap
(113)
Nyhetskommentarer
(102)
Kurser
(95)
Karriär
(90)
Life Science
(94)
Filmhistoria
(92)
Filosofi
(91)
Hus och trädgård
(91)
Natur
(88)
Medicin
(84)
Djur
(76)
Fordon
(83)
Alternativ hälsa
(84)
Fotboll
(84)
Komedifiktion
(77)
Ledarskap
(75)
Underhållningsnyheter
(69)
Utbildning för barn
(70)
Religion
(69)
Filmintervjuer
(63)
Dagliga nyheter
(58)
Affärsnyheter
(57)
Komediintervjuer
(57)
Hantverk
(52)
Motion
(50)
Marknadsföring
(44)
Näringslära
(45)
Sportnyheter
(40)
Sexualitet
(35)
Hockey
(38)
Buddhism
(37)
Judendom
(36)
Fysik
(34)
Geovetenskap
(32)
Ideell
(30)
Platser och resor
(29)
Astronomi
(27)
Amerikansk fotboll
(25)
Löpning
(24)
Vildmarken
(23)
Flyg
(22)
Animering och manga
(21)
Improvisering
(20)
Golf
(10)
Matematik
(14)
Hinduism
(13)
Kemi
(11)
Tennis
(8)
Baseball
(3)
Basket
(7)
Ståupp
(6)
Fantasysporter
(3)
Brottning
(2)
Cricket
(2)
Rugby
Simning
Start
/
CERIAS Weekly Security Seminar – Purdue University
/
Eric katz mobile phones and evidence preservation
CERIAS Weekly Security Seminar – Purdue University
Eric Katz, Mobile Phones and Evidence Preservation
49 min • 27 april 2011
Spela avsnitt
Spela avsnitt
Senaste avsnitt
Play
Pause
Paul Vixie, Force Projection in the Information Domain: Implications of DNS Security
30 april | 72 min
Play
Pause
Tristen Mullins, Using Side-Channels for Critical Infrastructure Protection
23 april | 36 min
Play
Pause
Richard Love, Russian Hacking: Why, How, Who, and to What End
16 april | 58 min
Play
Pause
Josiah Dykstra, Lessons for Cybersecurity from the American Public Health System
9 april | 50 min
Play
Pause
Michael Clothier, Annual CERIAS Security Symposium Closing Keynote IT, OT, IoT — It's Really Just the "T": An International and Historical Perspective
2 april | 65 min
Play
Pause
Tim Benedict, The Future of AI Depends on Guardrails
26 mars | 55 min
Play
Pause
Amir Sadovnik, What do we mean when we talk about AI Safety and Security?
12 mars | 55 min
Play
Pause
Hisham Zahid & David Haddad, Decrypting the Impact of Professional Certifications in Cybersecurity Careers
5 mars | 42 min
Play
Pause
Ali Al-Haj, Zero Trust Architectures and Digital Trust Frameworks: A Complementary or Contradictory Relationship?
26 februari | 52 min
Play
Pause
Adam Shostack, Risk is Not Axiomatic
12 februari | 64 min
Play
Pause
Mustafa Abdallah, Effects of Behavioral Decision-Making in Proactive Security Frameworks in Networked Systems
5 februari | 60 min
Play
Pause
D. Richard Kuhn, How Can We Provide Assured Autonomy?
29 januari | 56 min
Play
Pause
Nick Harrell, Mechanisms of Virality in Online Discourse
22 januari | 52 min
Play
Pause
Stanislav Kruglik, Querying Twice: How to Ensure We Obtain the Correct File in a Private Information Retrieval Protocol
15 januari | 44 min
Play
Pause
Christopher Yeomans, Fairness as Equal Concession: Critical Remarks on Fair AI
4 december 2024 | 53 min
Play
Pause
Mason Rice, Adversarial C2 inside OT Networks
20 november 2024 | 51 min
Play
Pause
Yanxue Jia, HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
6 november 2024 | 43 min
Play
Pause
Roger Grimes, Many Ways to Hack MFA
30 oktober 2024 | 57 min
Play
Pause
Alessandro Acquisti, Behavioral Advertising and Consumer Welfare
23 oktober 2024 | 54 min
Play
Pause
Xiaoqi Chen, SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes
16 oktober 2024 | 37 min
Play
Pause
Zhou Li, The Road Towards Accurate, Scalable and Robust Graph-based Security Analytics: Where Are We Now?
9 oktober 2024 | 55 min
Play
Pause
Michail Maniatakos, Dissecting the Software Supply Chain of Modern Industrial Control Systems
2 oktober 2024 | 56 min
Play
Pause
Chance Younkin, Shamrock Cyber – When Luck Just Isn't Enough
25 september 2024 | 60 min
Play
Pause
Ashok Vardhan Raja, Exploiting Vulnerabilities in AI-Enabled UAV: Attacks and Defense Mechanisms
18 september 2024 | 54 min
Play
Pause
Russel Waymire, IDART (Information Design Assurance Red Team): A Red Team Assessment Methodology
11 september 2024 | 66 min
Play
Pause
Chris Kubecka de Medina, Empowering the Next Generation of Digital Defenders: Ethics in Cybersecurity and Emerging Technologies
4 september 2024 | 60 min
Play
Pause
David Haddad, AI's Security Maze: Navigating AI's Top Cybersecurity Risks Through Strategic Planning and Resilient Operations
28 augusti 2024 | 57 min
Play
Pause
Shagufta Mehnaz, Privacy and Security in ML: A Priority, not an Afterthought
21 augusti 2024 | 63 min
Play
Pause
David Stracuzzi, Defining Trusted Artificial Intelligence for the National Security Space
24 april 2024 | 51 min
Play
Pause
Evan Sultanik, In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage
10 april 2024 | 53 min
Play
Pause
Daniel Shoemaker, Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education
27 mars 2024 | 57 min
Play
Pause
Douglas Huelsbeck, The Importance of Security by Design & The Importance of Including Cybersecurity Experts in Your Business Decisions
20 mars 2024 | 55 min
Play
Pause
Alejandro Cuevas, The Fault in Our Stars: How Reputation Systems Fail in Practice
6 mars 2024 | 61 min
Play
Pause
Sanket Naik, Modern Enterprise Cybersecurity: A CISO perspective
28 februari 2024 | 60 min
Play
Pause
Jennifer Bayuk, Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
21 februari 2024 | 61 min
Play
Pause
Jonathan (Jono) Spring, On Security Operations for AI Systems
14 februari 2024 | 65 min
Play
Pause
Maksim Eren, Tensor Decomposition Methods for Cybersecurity
7 februari 2024 | 41 min
Play
Pause
William Malik, Multifactor Authentication - The Problem, Recommendations, and Future Concerns
31 januari 2024 | 46 min
Play
Pause
Solomon Sonya, Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
24 januari 2024 | 62 min
Play
Pause
Leigh Metcalf, Grep for Evil
17 januari 2024 | 63 min
Play
Pause
Sandhya Aneja, Invisible Signatures: Device Fingerprinting in a Connected World
10 januari 2024 | 55 min
Play
Pause
Mu Zhang, Backtracking Intrusions in Modern Industrial Internet of Things
6 december 2023 | 51 min
Play
Pause
Robert Denz, Mind the Gap: Vulnerabilities and Opportunities for Cyber R&D at the Edge
29 november 2023 | 50 min
Play
Pause
Andy Ellis, How to Build and Measure a Corporate Security Program
15 november 2023 | 55 min
Play
Pause
Wen Masters, Cyber Risk Analysis for Critical Infrastructure
8 november 2023 | 39 min
Play
Pause
Steve Lipner, Thinking About the Future of Encryption
1 november 2023 | 63 min
Play
Pause
Courtney Falk, The Bride of the Pod People
25 oktober 2023 | 60 min
Play
Pause
Derek Dervishian, Fuzzing: Understanding the Landscape
18 oktober 2023 | 55 min
Play
Pause
Rebecca Herold, Sorting Surveillance Benefits from Harms
11 oktober 2023 | 63 min
Play
Pause
Khaled Serag, Vulnerability Identification and Defense Construction in Cyber-Physical Systems
4 oktober 2023 | 53 min
Play
Pause
Scott Sage, Erin Miller, How the Cyberspace Domain has Changed the Game for the Space Domain
27 september 2023 | 53 min
Play
Pause
Christopher Nuland, Enhancing Software Supply Chain Security in Distributed Systems
20 september 2023 | 67 min
Play
Pause
Stuart Shapiro, MITRE PANOPTIC™ Privacy Threat Model
13 september 2023 | 53 min
Play
Pause
Rita Foster, Cyber defender's plead - If it's not codified – Please go away
6 september 2023 | 52 min
Play
Pause
Dr. Anand Singh, The State of Software Supply Chain Security
30 augusti 2023 | 60 min
Play
Pause
Marina Gavrilova, Advancements and New Developments in Biometric Privacy, Security and Ethics
19 april 2023 | 50 min
Play
Pause
Kelly FitzGerald, Don't Copy That Floppy!: A History of Anti-cracking Controls in Early Video Games and Its Economic Impact
12 april 2023 | 43 min
Play
Pause
Sayak Ray, Pre-Silicon Hardware Security Analysis through Information Flow Tracking - Current Industry Applications and Research Questions
5 april 2023 | 51 min
Play
Pause
Wendy Nather, CERIAS Security Symposium Closing Keynote
29 mars 2023 | 58 min
Play
Pause
Steve Bellovin, 35 Years of Protecting the Internet
22 mars 2023 | 60 min
Play
Pause
Patrick Schlapfer, Using Endpoint Isolation to Track Malware Trends
8 mars 2023 | 49 min
Play
Pause
Albert Cheng, Elements of Robust Real-Time Systems: Regularity-Based Virtualization and Functional Reactive Programming
1 mars 2023 | 55 min
Play
Pause
Arjan Durresi, Trust Engineering – from Developing Resilient Systems to Artificial Conscience
22 februari 2023 | 60 min
Play
Pause
Dean Cheng, Chinese Views of Information and Future Warfare
15 februari 2023 | 50 min
Play
Pause
Ronald Keen, Increasing Dependency; Increasing Threat
8 februari 2023 | 60 min
Play
Pause
Jason Ortiz, Securing Your Software Supply Chain
1 februari 2023 | 63 min
Play
Pause
Aurobindo Sundaram, Our Journey in Phishing Mitigation
25 januari 2023 | 61 min
Play
Pause
Mummoorthy Murugesan, Problems and Challenges in Data Security Posture Management
18 januari 2023 | 53 min
Play
Pause
Ambrose Kam, Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine
11 januari 2023 | 56 min
Play
Pause
Julie Haney, Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned
7 december 2022 | 50 min
Play
Pause
Meng Xu, Fast and Reliable Formal Verification of Smart Contracts with the Move Prover
30 november 2022 | 47 min
Play
Pause
Brian Barnier & Prachee Kale, Making Cybersecurity Reliable and Cybersecurity Careers Rewarding
16 november 2022 | 51 min
Play
Pause
Christine Task, Data, Privacy---and the Interactions Between Them
9 november 2022 | 61 min
Play
Pause
Ning Zhang, Security and Privacy in the Cyber-physical World
26 oktober 2022 | 42 min
Play
Pause
Florian Kerschbaum, On Using Differential Privacy
19 oktober 2022 | 48 min
Play
Pause
David C. Benson, Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power
12 oktober 2022 | 44 min
Play
Pause
Maggie MacAlpine, Ransomware and the Future of Cyberwarfare
5 oktober 2022 | 50 min
Play
Pause
Dipankar Dasgupta, Adaptive Multi-Factor Authentication & Cyber Identity
28 september 2022 | 49 min
Play
Pause
Abhilasha Bhargav-Spantzel & Sonnie Ebikwo, "With great power comes great responsibility" – Responsible Cybersecurity Innovations and Investments for Cloud Computing
21 september 2022 | 55 min
Play
Pause
James Huffaker, Cyber Security in Aviation
14 september 2022 | 51 min
Play
Pause
Cuihua (Cindy) Shen, A Fake Image is Worth a Thousand Lies
7 september 2022 | 50 min
Play
Pause
Chris Jenkins, Moving Target Defense for Space Systems
31 augusti 2022 | 48 min
Play
Pause
Kevin Kornegay, IoT Device Security in a Zero Trust Environment
24 augusti 2022 | 46 min
Play
Pause
Máire O'Neill, Securing Connected Devices – Challenge and Opportunities
27 april 2022 | 59 min
Play
Pause
Dr. Guan-Hua (Scott) Tu, Enabling a Practically Secure Mobile Networked System
20 april 2022 | 55 min
Play
Pause
Paul Rosenzweig, Crowd Forecasting to Enhance Cybersecurity
13 april 2022 | 57 min
Play
Pause
Jim Alves-Foss, Automated Function Boundary Detection in Stripped Binaries
6 april 2022 | 51 min
Play
Pause
Richard Clarke, Now That We're in a Hybrid War…
30 mars 2022 | 65 min
Play
Pause
Bill Newhouse, Challenges at the NIST National Cybersecurity Center of Excellence
23 mars 2022 | 60 min
Play
Pause
Andy Klein, What You Don't Know About Hard Drives!
9 mars 2022 | 55 min
Play
Pause
Samuel Visner, The Evolution of Cybersecurity and its Role in the International System
2 mars 2022 | 61 min
Play
Pause
Chen-Ching Liu, Cyber-Physical System Security of the Power Grid
23 februari 2022 | 56 min
Play
Pause
Bob Gourley, The Metaverse: Infinite attack surface and boundless risk
16 februari 2022 | 59 min
Play
Pause
Dr. Chris C. Demchak, Robust Collective Cyber Power across Consolidated Democracies
9 februari 2022 | 50 min
Play
Pause
Alyssa Miller, Threat Modeling in the World of DevOps
2 februari 2022 | 65 min
Play
Pause
Dr. David Mussington, Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence
26 januari 2022 | 48 min
Play
Pause
Chuck Brooks, Leading Trends and Emerging Technologies for Cybersecurity in 2022
19 januari 2022 | 43 min
Play
Pause
Melissa Dark, Building the Next Generation Cybersecurity Workforce: Progress and Challenges
12 januari 2022 | 58 min
Play
Pause
Melissa Hathaway & Francesca Spidalieri, Integrating Cybersecurity into Digital Development
8 december 2021 | 58 min
Play
Pause
Kacper Gradon, Future Trends in Cyber Crime and Hybrid Warfare
1 december 2021 | 70 min
Play
Pause
Lesley Carhart, You Are The Future of Industrial Cybersecurity
17 november 2021 | 67 min
Play
Pause
Helen Patton, Navigating the Cybersecurity Profession: Essential Elements for a Satisfying Career
3 november 2021 | 58 min
Play
Pause
Jeremiah Blocki, Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking
27 oktober 2021 | 48 min
Play
Pause
Amit Yoran, Symposium Closing Keynote
20 oktober 2021 | 47 min
Play
Pause
Jordan Mauriello, Understanding Attackers and Motivations
13 oktober 2021 | 42 min
Play
Pause
Yoon Auh, NUTS: The Beta Demo
6 oktober 2021 | 61 min
Play
Pause
Jennifer Bayuk, The History of Cybersecurity Metrics
29 september 2021 | 68 min
Play
Pause
Paula deWitte, The Need for Legal Education within a Cybersecurity Curriculum
22 september 2021 | 60 min
Play
Pause
Aaron Shafer, Securing SaaS, a Practitioner's Guide
15 september 2021 | 52 min
Play
Pause
Jeremy Rasmussen, The Changing Cybersecurity Threatscape
25 augusti 2021 | 63 min
Play
Pause
Nasir Memon, AI, Computational Imaging and the Battle for Media Integrity
28 juli 2021 | 60 min
Play
Pause
David Dill, A Formal Verifier for the Diem Blockchain Move Language
21 juli 2021 | 59 min
Play
Pause
Dave Henthorn, Educating the Next Generation on the Challenges of Securing Critical Infrastructure
14 juli 2021 | 60 min
Play
Pause
Winn Schwartau, Security is Probabilistic, Not Deterministic: Get Over It
7 juli 2021 | 57 min
Play
Pause
Neil Daswani, Big Breaches: Cybersecurity Lessons For Everyone
30 juni 2021 | 60 min
Play
Pause
Laura Thomas, National Security Implications of Quantum Technology
23 juni 2021 | 49 min
Play
Pause
Ida Ngambeki, Understanding the Human Hacker
16 juni 2021 | 76 min
Play
Pause
Neil Gong, Secure Federated Learning
9 juni 2021 | 64 min
Play
Pause
Leigh Metcalf, The Gauntlet of Cybersecurity Research
2 juni 2021 | 54 min
Play
Pause
Gary McGraw, Security Engineering for Machine Learning
26 maj 2021 | 62 min
Play
Pause
Steven Furnell, Cybersecurity Skills – Easy to say, harder to recognise?
28 april 2021 | 61 min
Play
Pause
Ira Winkler, You Can Stop Stupid: Human Security Engineering
21 april 2021 | 61 min
Play
Pause
Yimin Chen, Delving into differential privacy and anomaly detection: a meta-learning perspective
14 april 2021 | 41 min
Play
Pause
Tawei (David) Wang, The Invisible Risks: An Empirical Analysis on Data Sharing Activities and Systemic Risk among the Data Brokers
7 april 2021 | 45 min
Play
Pause
Frederick Scholl, Cybercrime: A Proposed Solution
31 mars 2021 | 56 min
Play
Pause
Jack Daniel, The Shoulders of InfoSec
24 mars 2021 | 57 min
Play
Pause
Santiago Torres-Arias, Practical software Supply Chain Security and Transparency
17 mars 2021 | 40 min
Play
Pause
Greg Akers, SDN/NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool
10 mars 2021 | 44 min
Play
Pause
Randall Brooks, Cyber Supply Chain Risk Management (SCRM) and its impact on information and Operational Technology (IT/OT)
3 mars 2021 | 57 min
Play
Pause
Caroline Wong, Security Industry Context
24 februari 2021 | 47 min
Play
Pause
Cory Doctorow, Technology, Self-Determination, and the Future of the Future
17 februari 2021 | 63 min
Play
Pause
Levi Lloyd, Securing the Software Supply Chain
10 februari 2021 | 51 min
Play
Pause
Steve Lipner, Lessons Learned – Fifty Years of Mistakes in Cybersecurity
3 februari 2021 | 51 min
Play
Pause
Scott Shackelford, The Internet of Things: What Everyone Needs to Know
27 januari 2021 | 53 min
Play
Pause
Adwait Nadkarni, Building Practical Security Systems for the Post-App Smart Home
20 januari 2021 | 60 min
Play
Pause
Lorrie Cranor, Security and Privacy for Humans
9 december 2020 | 58 min
Play
Pause
Kimberly Ferguson-Walter, Maximizing Cyber Deception to Improve Security: An Empirical Analysis
2 december 2020 | 54 min
Play
Pause
Sivaram Ramanathan, Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection
18 november 2020 | 44 min
Play
Pause
Abhilasha Bhargav-Spantzel, Fearless Computing
11 november 2020 | 51 min
Play
Pause
Kelley Misata, Results from the Field: Cybersecurity in Nonprofits and Why it Matters
4 november 2020 | 56 min
Play
Pause
Yoon Auh, NUTS: eNcrypted Userdata Transit & Storage; Viewing Data as an Endpoint™ (DaaE) using Structured Cryptography
28 oktober 2020 | 51 min
Play
Pause
Jeff Man, Why Attack When You Can Defend
21 oktober 2020 | 62 min
Play
Pause
Courtney Falk, The Pod People Campaign: Driving User Traffic via Social Networks
14 oktober 2020 | 60 min
Play
Pause
Michael Clark, From Machine Learning Threats to Machine Learning Protection Requirements
7 oktober 2020 | 52 min
Play
Pause
, Global Challenges in Security and Privacy Policy: elections, pandemics, and biometric technologies
30 september 2020 | 57 min
Play
Pause
Osman Ismael, TCB: From Assumption to Assurance
23 september 2020 | 51 min
Play
Pause
Warda Zahid Khan, Authentication: Behind The Scenes When You Click "Check Out"
16 september 2020 | 53 min
Play
Pause
Rich Banta, EMP Threat & Protection
9 september 2020 | 54 min
Play
Pause
Roger Schell, Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel
2 september 2020 | 59 min
Play
Pause
Jeremiah Sahlberg, From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
26 augusti 2020 | 50 min
Play
Pause
Elena Peterson, Flexible and Adaptive Malware Identification Using Techniques from Biology
19 augusti 2020 | 60 min
Play
Pause
Shimon Modi, Value of Cyber Threat Intelligence in Modern Security Operations
12 augusti 2020 | 57 min
Play
Pause
Carter Bullard, Network Awareness and Predictive Cyber Analytics
29 juli 2020 | 58 min
Play
Pause
Sam Curry and Alon Kaufman, The Ghost in the Machine: Reconciling AI and Trust in the Connected World
22 juli 2020 | 60 min
Play
Pause
Joe Weiss, Cyber Security of Control Systems: The Second Coming of the Maginot Line
15 juli 2020 | 62 min
Play
Pause
Jim Richberg, Election Security in the Age of COVID-19: Risk Management in the face of a "Perfect Storm"
1 juli 2020 | 60 min
Play
Pause
Nandi Leslie, Using Machine Learning for Network Intrusion Detection
24 juni 2020 | 56 min
Play
Pause
Sami Saydjari, A Principled Approach to Cybersecurity Engineering
17 juni 2020 | 60 min
Play
Pause
Corey Maypray, Proactive Endpoint and Network Security Operations. Detecting the Unknown Known
29 april 2020 | 68 min
Play
Pause
Bruce Coffing, Public Sector Cyber Security 2020: Challenges and Rewards
22 april 2020 | 55 min
Play
Pause
Leon Ravenna, Everyone Wants to Help You: Understanding the Issues and Surviving with a Multitude of Regulatory Authorities
15 april 2020 | 51 min
Play
Pause
Elliott Peterson, Mirai - DDoS and the Criminal Ecosystem
8 april 2020 | 74 min
Play
Pause
Neil Rowe, Empirical Digital Forensics
1 april 2020 | 53 min
Play
Pause
Nick Sturgeon, Cyber Risk Management 101
25 mars 2020 | 76 min
Play
Pause
Vireshwar Kumar, Security and Privacy of Connected Autonomous Vehicles
11 mars 2020 | 57 min
Play
Pause
Matt Mickelson, Physics-Based Approaches for creating Cyber Resilient Systems
4 mars 2020 | 52 min
Play
Pause
Yuhong Nan, Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
26 februari 2020 | 34 min
Play
Pause
Doug Rapp, Security, Ethics and the End of the World as We Know It
19 februari 2020 | 63 min
Play
Pause
Char Sample, The Role of Culture in Cybersecurity
12 februari 2020 | 55 min
Play
Pause
Syed Rafiul Hussain, Automated Reasoning of Security and Privacy of Cellular Networks
5 februari 2020 | 54 min
Play
Pause
Abe Baggili, Immersive Virtual Insanity: Exploring Immersive Virtual Reality Security and Forensics
29 januari 2020 | 60 min
Play
Pause
Morgan Princing, Identifying Security Risks Using Internet-Wide Scan Data
22 januari 2020 | 37 min
Play
Pause
Sriharsha Etigowni, Contactless Control Flow Monitoring via Electromagnetic Emanations
15 januari 2020 | 35 min
Play
Pause
Boyang Wang, Fingerprinting Encrypted Voice Commands on Smart Speakers
4 december 2019 | 48 min
Play
Pause
Mohsen Minaei, Forgetting the Forgotten: Conceal Content Deletions from Persistent Observers
20 november 2019 | 45 min
Play
Pause
Celeste Paul, Hacking Stressed: Frustration, burnout, and the pursuit of happiness
13 november 2019 | 53 min
Play
Pause
James Cole, Securing the Internet of Things
6 november 2019 | 46 min
Play
Pause
Mitch Parker, Bitcoin and other dreams of utopian thinking-what happens when they meet reality?
30 oktober 2019 | 49 min
Play
Pause
Leon Ravenna, Your Privacy has been Breached
23 oktober 2019 | 51 min
Play
Pause
Andrew Rozema, 'Networking' Skills for Cybersecurity
16 oktober 2019 | 47 min
Play
Pause
Chet Hosmer, Forensic Identification of Fake Digital Photographs
9 oktober 2019 | 44 min
Play
Pause
Chris Jenkins, Moving Target Defense for a Serial Communication Protocol
2 oktober 2019 | 41 min
Play
Pause
Aritra Mitra, A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine Resilience
11 september 2019 | 54 min
Play
Pause
Luke Butcher, Connected Intelligence
4 september 2019 | 37 min
Play
Pause
Steve Lodin, The Golden Rules of Security and Assurance
28 augusti 2019 | 53 min
Play
Pause
Eugene Spafford, Rethinking Cyber Security
21 augusti 2019 | 49 min
Play
Pause
Lauren Featherstun, Shivam Trivedi, Brian Werts, Erik Gough, The Purdue Live Security Analyzer (PULSAR)
24 april 2019 | 43 min
Play
Pause
Robert Mundt, Protecting your online Identity in a world of modern application architecture
17 april 2019 | 40 min
Play
Pause
Jim Routh, The Rise of Unconventional Security Controls
10 april 2019 | 63 min
Play
Pause
Krishna Kavi, Hardware Cybersecurity Attacks and Some Solutions
3 april 2019 | 52 min
Play
Pause
Wei Jiang, Efficient and Constant-Round Secure Comparison through Function Transformation, Dynamic Group Switching and Asymmetric Computation
27 mars 2019 | 57 min
Play
Pause
Sathish Kumar, Securing IoT-based Cyber-Physical Human Systems against diverse attacks
20 mars 2019 | 47 min
Play
Pause
Charles Kamhoua, Game Theoretic Modeling of Cyber Deception in the Internet of Battlefield Things
6 mars 2019 | 31 min
Play
Pause
Bowei Xi, A Game Theoretic Approach for Adversarial Machine Learning -- When Big Data Meets Cyber Security
27 februari 2019 | 40 min
Play
Pause
Meng Yu, Protection against Compromised Operating Systems on ARM Cortex-A Architecture
20 februari 2019 | 53 min
Play
Pause
David Ebert, Trustable Information for Security Applications: Visual Analytics for Reliable, Effective Decision Making
6 februari 2019 | 54 min
Play
Pause
Sanjay Madria, Secure Information Forwarding through Fragmentation in Delay- tolerant Networks
23 januari 2019 | 48 min
Play
Pause
Chris Clifton, A Data Privacy Primer
16 januari 2019 | 49 min
Play
Pause
Haotian Deng, CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference & Verification
9 januari 2019 | 37 min
Play
Pause
Yousra Aafer, Normalizing Diverse Android Access Control Checks for Inconsistency Detection
5 december 2018 | 30 min
Play
Pause
James Lerums, Developing a Public/Private Cybersecurity Scorecard for the State of Indiana
28 november 2018 | 44 min
Play
Pause
Courtney Falk, Enemy Perspectives: When Nation-States Meet Cybercriminals
14 november 2018 | 53 min
Play
Pause
Jason Ortiz, IoT Security: Living on the Edge
7 november 2018 | 67 min
Play
Pause
Meng Xu, Precise and Scalable Detection of Double-Fetch Bugs in Kernels
31 oktober 2018 | 48 min
Play
Pause
Mark Loepker, 80/20 Rule-Cyber Hygiene
24 oktober 2018 | 59 min
Play
Pause
Ryan Goldsberry, Applied Cyber and Mobile Security Consulting
17 oktober 2018 | 29 min
Play
Pause
Jessy Irwin, Double the Factors, Double the Fails: How Usability Obstacles Impact Adoption of Strong Authentication Habits
10 oktober 2018 | 64 min
Play
Pause
Shiqing Ma, Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
26 september 2018 | 39 min
Play
Pause
Jillean Long Battle, What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation
19 september 2018 | 60 min
Play
Pause
Doug Rapp, Breaching Water Treatment Plants: Lessons Learned from Complex Exercises
5 september 2018 | 55 min
Play
Pause
Ryan Elkins, Hacking Your Security Career: Strategies That College Did Not Teach Me
29 augusti 2018 | 39 min
Play
Pause
Abe Clements, Protecting Bare-metal Embedded Systems from Memory Corruption Attacks
22 augusti 2018 | 41 min
Play
Pause
Cristina Ledezma, DoD Cyber Requirements and Directives
25 april 2018 | 46 min
Play
Pause
Leon Ravenna, Personally Identifiable Data and the Specter of Customer Privacy
18 april 2018 | 51 min
Play
Pause
Debajyoti Das, Anonymity Trilemma : Strong Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two.
11 april 2018 | 44 min
Play
Pause
Josh Corman, Symposium Closing Keynote - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years
4 april 2018 | 62 min
Play
Pause
Chris Reed, Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
28 mars 2018 | 51 min
Play
Pause
Pedro Moreno-Sanchez, Mind Your Credit: Assessing the Health of the Ripple Credit Network
21 mars 2018 | 45 min
Play
Pause
Nathan Burrow, CFIXX -- Object Type Integrity for C++
7 mars 2018 | 41 min
Play
Pause
Courtney Falk, Threats and Risks in Cryptocurrencies
28 februari 2018 | 47 min
Play
Pause
Mitchell Parker, Lessons Learned From the Retrocomputing Community
21 februari 2018 | 48 min
Play
Pause
Adil Ahmad, OBLIVIATE: A Data Oblivious File System for Intel SGX
14 februari 2018 | 58 min
Play
Pause
Brian Lynch, Eli Lilly's Path to a Successful Threat Intelligence Program
7 februari 2018 | 45 min
Play
Pause
Matt Dimino, State of Cybersecurity in Healthcare
31 januari 2018 | 67 min
Play
Pause
Lotfi ben-Othmane, What Roles Can Empirical Research Play to Advance Software Security Knowledge?
24 januari 2018 | 57 min
Play
Pause
Ben Harsha, The Economics of Offline Password Cracking
17 januari 2018 | 48 min
Play
Pause
Nat Shere, Penetration Testing: What? Why? How?
6 december 2017 | 50 min
Play
Pause
Kirsten Bay, Securing the Future of Business: Broadening the Role of Security Technology
29 november 2017 | 45 min
Play
Pause
Abhishek Ray, Ad-Blockers: Extortionists or Digital Age Robin Hoods?
15 november 2017 | 37 min
Play
Pause
Nikita Borisov, Refraction Networking: Censorship Circumvention in the Core of the Internet
8 november 2017 | 60 min
Play
Pause
Mikhail J. Atallah, Opportunities and Perils of the Cyber Revolution
1 november 2017 | 61 min
Play
Pause
Jerome Edge, Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
25 oktober 2017 | 48 min
Play
Pause
Tianhao Wang, Locally Differential Private Protocols for Frequency Estimation
18 oktober 2017 | 47 min
Play
Pause
Jeremiah Blocki, Memory Hard Functions and Password Hashing
11 oktober 2017 | 54 min
Play
Pause
Xiaonan Guo, Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
4 oktober 2017 | 40 min
Play
Pause
Tony Huffman, Vulnerability Scanning, how it works and why
27 september 2017 | 40 min
Play
Pause
Vince D'Angelo, Counter UAS Challenges and Technology
20 september 2017 | 25 min
Play
Pause
Bob Cheripka, Advanced Testing Assessments in the Power & Utilities Industry
13 september 2017 | 47 min
Play
Pause
Doug Smith, Secure Code Development
6 september 2017 | 46 min
Play
Pause
Chris Roberts, The Stark Reality of Red vs. Blue and Why it's Not Working
30 augusti 2017 | 58 min
Play
Pause
Shiqing Ma, MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
23 augusti 2017 | 49 min
Play
Pause
Adam Bates, Enabling Trust and Efficiency in Provenance-Aware Systems
26 april 2017 | 56 min
Play
Pause
Ron Ross, Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
19 april 2017 | 66 min
Play
Pause
Limin Jia, Information Flow Security in Practical Systems
12 april 2017 | 58 min
Play
Pause
Scott Carr, DataShield: Configurable Data Confidentiality and Integrity
29 mars 2017 | 32 min
Play
Pause
Tawei (David) Wang, CIO Risk Appetite and Information Security Management
22 mars 2017 | 50 min
Play
Pause
Stephen Reynolds, The Rise of Cyber-Crime: A Legal Perspective
8 mars 2017 | 51 min
Play
Pause
Yonghwi Kwon, A2C: Self Destructing Exploit Executions via Input Perturbation
22 februari 2017 | 50 min
Play
Pause
Ashish Hota, Behavioral and Computational Aspects of Network Security Games
15 februari 2017 | 48 min
Play
Pause
Neil Cassidy, Cyber Security in Large Complex Corporations
8 februari 2017 | 54 min
Play
Pause
Vincent Urias, Network Deception as a Threat Intelligence Platform
1 februari 2017 | 50 min
Play
Pause
Jean Camp, Changing the Economics of the Network
25 januari 2017 | 48 min
Play
Pause
Nick Sturgeon, Emerging Cyber Threats
18 januari 2017 | 61 min
Play
Pause
Aniket Kate, Differential Guarantees for Cryptographic Systems
11 januari 2017 | 53 min
Play
Pause
Yinqian Zhang, When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices
7 december 2016 | 55 min
Play
Pause
Abhilasha Bhargav-Spantzel, Digital Identity Protection
30 november 2016 | 46 min
Play
Pause
Corey Holzer, The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain
16 november 2016 | 36 min
Play
Pause
Sanjai Narain, A Science of Cyber Infrastructure Configuration
9 november 2016 | 57 min
Play
Pause
Victor Raskin, New Research and Resources in NL IAS at Purdue
26 oktober 2016 | 53 min
Play
Pause
Jeremiah Blocki, Usable and Secure Human Authentication
19 oktober 2016 | 54 min
Play
Pause
Terry Ching-Hsiang Hsu, Enforcing Least Privilege Memory Views for Multithreaded Applications
12 oktober 2016 | 27 min
Play
Pause
Tony Sager, Growing Up In Cyber, But Is Cyber Growing Up?
5 oktober 2016 | 59 min
Play
Pause
Nicholas Reuhs, The role of cyber insurance in security and risk management
28 september 2016 | 53 min
Play
Pause
Aniket Kate, The Internet of Value: Privacy and Applications
21 september 2016 | 58 min
Play
Pause
Di Jin, General Motors Product Cybersecurity Overview
14 september 2016 | 56 min
Play
Pause
Maria Andrews, Improving Outcomes with Services
7 september 2016 | 44 min
Play
Pause
Srivatsan Ravi, Towards Safe In-memory Transactions
31 augusti 2016 | 55 min
Play
Pause
Michael Taylor, Secure Coding - Patterns and anti-patterns in the design & architecture of secure applications
24 augusti 2016 | 62 min
Play
Pause
Christopher N. Gutierrez, ErsatzPasswords - Ending Password Cracking
27 april 2016 | 32 min
Play
Pause
Kelley Misata, Information Security: Through the Lens of Crisis Organizations
20 april 2016 | 53 min
Play
Pause
Richard M. (Dickie) George, Life as a Target
20 april 2016 | 53 min
Play
Pause
Pedro Moreno Sanchez, Privacy-preserving payments in credit networks
13 april 2016 | 45 min
Play
Pause
Endadul Hoque, Finding Specification Noncompliance and Attacks in Wireless Network Protocol Implementations
6 april 2016 | 58 min
Play
Pause
Chris Kanich, Bottom Line Security: Understanding the True Cost of Cybersecurity Attacks
30 mars 2016 | 51 min
Play
Pause
Kent Seamons, Usable Secure Webmail for Grassroots Adoption
23 mars 2016 | 56 min
Play
Pause
Ryan Henry, Batch Techniques for Practical Private Information Retrieval
9 mars 2016 | 56 min
Play
Pause
Anupam Joshi, Context Aware, Policy based approaches to Security
2 mars 2016 | 56 min
Play
Pause
Xukai Zou, Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
24 februari 2016 | 59 min
Play
Pause
Bruno Ribeiro, Predicting What Users Will do Next
17 februari 2016 | 41 min
Play
Pause
Nicholas Sturgeon, IN-ISAC: SOC, Security Awareness and More
10 februari 2016 | 57 min
Play
Pause
Hemanta Maji, Robust Secure Computation
3 februari 2016 | 48 min
Play
Pause
Elisa Bertino, Big Data Security and Privacy
27 januari 2016 | 50 min
Play
Pause
Chris Clifton, Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box
20 januari 2016 | 56 min
Play
Pause
Jim Gallagher, Microsemi Security Solutions and Threat Driven Security
13 januari 2016 | 50 min
Play
Pause
Aniket Kate, Preventing or Penalizing Equivocation in Decentralized Environments
9 december 2015 | 50 min
Play
Pause
Laura Amo, Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
2 december 2015 | 50 min
Play
Pause
Jongho Won, A Secure Communication Protocol for Drones and Smart Objects
18 november 2015 | 40 min
Play
Pause
Ariel Feldman, Verifying Computations with (Private) State
11 november 2015 | 56 min
Play
Pause
Balamurugan Anandan, Secure Multiparty Computation and Differential Privacy
4 november 2015 | 52 min
Play
Pause
Kate Seigfried-Spellar, Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
28 oktober 2015 | 56 min
Play
Pause
Koray Mancuhan, Anonymized Data
21 oktober 2015 | 52 min
Play
Pause
Fang-Yu Rao, A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
14 oktober 2015 | 47 min
Play
Pause
Kevin McPeak, The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
7 oktober 2015 | 55 min
Play
Pause
Omar Chowdhury, Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
30 september 2015 | min
Play
Pause
Kexin Pei, LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
23 september 2015 | 31 min
Play
Pause
John Feddema, Evaluation of Urban Vehicle Tracking Algorithms
16 september 2015 | 35 min
Play
Pause
Yonghwi Kwon, P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
9 september 2015 | 44 min
Play
Pause
Jianjun Huang, SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps
2 september 2015 | 41 min
Play
Pause
Samuel Jero, Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
26 augusti 2015 | 45 min
Play
Pause
Steve Bellovin, Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
29 april 2015 | 61 min
Play
Pause
Rohit Ranchal & Payuna Uday & Zhemei Fang, CERIAS Poster Contest Winners
22 april 2015 | 34 min
Play
Pause
Yan Huang, Engineering Secure Computation -- Efficiently
15 april 2015 | 52 min
Play
Pause
Rebecca Herold, Privacy Potpourri: Changing Privacy from the Bottom Up
8 april 2015 | 56 min
Play
Pause
Kui Ren, Breaking Mobile Social Networks for Automated User Location Tracking
1 april 2015 | 45 min
Play
Pause
Michelle Dennedy, Symposium/Michelle Dennedy, Intel
25 mars 2015 | 54 min
Play
Pause
Andrew Pyles, Virtual Android Malware Detection and Analysis (VAMDA)
11 mars 2015 | 34 min
Play
Pause
Xinming Ou, Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology
4 mars 2015 | 52 min
Play
Pause
Kami Vaniea, Software updates: decisions and security implications
25 februari 2015 | 55 min
Play
Pause
Ninghui Li, Privacy Notions for Data Publishing and Analysis
18 februari 2015 | 50 min
Play
Pause
Mathias Payer, Code-Pointer Integrity
11 februari 2015 | 41 min
Play
Pause
Omar Chowdhury, Regulatory Compliance Checking Over Encrypted Audit Logs
4 februari 2015 | 50 min
Play
Pause
Savvas Savvides, Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds
28 januari 2015 | 48 min
Play
Pause
Bharath Samanthula, Security with Privacy - A Research Agenda
21 januari 2015 | 53 min
Play
Pause
Jackie Rees Ulmer, Learning from Information Security Maturity: A Textual Analysis
14 januari 2015 | 49 min
Play
Pause
Xiangyu Zhang, How Program Analysis can be Used in Security Applications
10 december 2014 | 55 min
Play
Pause
Marcus Ranum, Privacy in the Age of the Police State
19 november 2014 | 64 min
Play
Pause
Kevin Bowers, You can hack, but you can't hide: Using log analysis to detect APTs
12 november 2014 | 43 min
Play
Pause
Barrett Caldwell and Omar Eldardiry, Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers
5 november 2014 | 50 min
Play
Pause
Robert Zimmerman, Healthcare Security and Privacy: Not There Yet
29 oktober 2014 | 52 min
Play
Pause
Golden G. Richard III, "Memory Analysis, Meet GPU Malware"
22 oktober 2014 | 49 min
Play
Pause
Stephen Elliott, Biometrics and Usability
8 oktober 2014 | 51 min
Play
Pause
Larry Ponemon, Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis
1 oktober 2014 | 49 min
Play
Pause
Sam Liles, Threat intelligence and digital forensics
24 september 2014 | 53 min
Play
Pause
Mark Guido, MITRE/Purdue Mobile Masquerading User Experiment
17 september 2014 | 71 min
Play
Pause
Mathias Payer, WarGames in Memory: Fighting Powerful Attackers
10 september 2014 | 47 min
Play
Pause
Brendan Saltaformaggio, DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
3 september 2014 | 23 min
Play
Pause
Rachel Sitarz, Women In Cyber Security
30 april 2014 | 41 min
Play
Pause
Masooda Bashir, Online Privacy Agreements, is it Informed Consent?
16 april 2014 | 52 min
Play
Pause
Chris Jenkins, Integrity Levels: A New Paradigm for Protecting Computing Systems
9 april 2014 | 54 min
Play
Pause
Philip Ritchey & Mohammed Almeshekah, CERIAS Poster Contest Winners
2 april 2014 | 37 min
Play
Pause
Joshua Corman, Why so CERIAS!? Why we're losing and what to do about it.
26 mars 2014 | 67 min
Play
Pause
Marina Blanton, General-Purpose Secure Computation and Outsourcing
12 mars 2014 | 58 min
Play
Pause
Marina Gavrilova, Machine Intelligence for Biometric and On-Line Security
5 mars 2014 | 59 min
Play
Pause
Rahul Potharaju, Delivering "Always-on" Services Despite Flaky Network Infrastructure
26 februari 2014 | 51 min
Play
Pause
Ed Felten, Technical Tradeoffs in the NSA's Mass Phone Call Program
19 februari 2014 | 53 min
Play
Pause
Ting-Fang Yen, Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
12 februari 2014 | 41 min
Play
Pause
Shumiao Wang, Secure and Private Outsourcing to Untrusted Cloud Servers
29 januari 2014 | 51 min
Play
Pause
Marina Kaljurand, Economic Policy and Cyber Challenges in Estonia
4 december 2013 | 50 min
Play
Pause
Muhammad Umer Arshad, Trust Management for Publishing Graph Data
20 november 2013 | 56 min
Play
Pause
Randall Brooks, Cloud Security: How Does Software Assurance Apply
13 november 2013 | 49 min
Play
Pause
Tejashree Datar, Yahoo! Messenger Forensics on Windows Vista and Windows 7
6 november 2013 | 29 min
Play
Pause
Ninghui Li, Membership Privacy: A Unifying Framework For Privacy Definitions
30 oktober 2013 | 50 min
Play
Pause
Daniel DeLaurentis, Systems of Systems: Opportunities and Challenges
23 oktober 2013 | 51 min
Play
Pause
Paul Thompson, The Durkheim Project: Privacy Considerations in Predicting Military and Veteran Suicide Risk
25 september 2013 | 46 min
Play
Pause
Mark Crosbie, Tim Tickel, Four Flynn, Protecting a billion identities without losing (much) sleep
18 september 2013 | 47 min
Play
Pause
John Butterworth, BIOS Chronomancy: Using Timing-Based Attestation to Detect Firmware Rootkits
4 september 2013 | 51 min
Play
Pause
Keith Watson, Information Security Challenges in an Academic Environment
28 augusti 2013 | 39 min
Play
Pause
Jarek Duda, New possibilities of steganography based on Kuznetsov-Tsybakov problem
21 augusti 2013 | 43 min
Play
Pause
David Pisano, Identity-Based Internet Protocol Network
24 april 2013 | 29 min
Play
Pause
Rahul Potharaju, Towards Automated Problem Inference from Trouble Tickets
17 april 2013 | 50 min
Play
Pause
Aaron Massey, Regulatory Compliance Software Engineering
27 mars 2013 | 50 min
Play
Pause
Kristin Heckman, Active Cyber Network Defense with Denial and Deception
20 mars 2013 | 55 min
Play
Pause
Emiliano DeCristofaro, Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?
6 mars 2013 | 60 min
Play
Pause
Weining Yang, Minimizing Private Data Disclosures in the Smart Grid
20 februari 2013 | 48 min
Play
Pause
Rahul Potharaju, I'm not stealing, I'm merely borrowing - Plagiarism in Smartphone App Markets
13 februari 2013 | 57 min
Play
Pause
Chris Gates, Using Probabilistic Generative Models for Ranking Risks of Android Apps
6 februari 2013 | 48 min
Play
Pause
Christian F. Hempelmann, A Semantic Baseline for Spam Filtering
30 januari 2013 | 56 min
Play
Pause
Wahbeh Qardaji, Differentially Private Publishing of Geospatial Data
23 januari 2013 | 59 min
Play
Pause
Bilal Shebaro, You are Anonymous!!! Then you must be Lucky
5 december 2012 | 56 min
Play
Pause
Ashish Kundu, A New Class of Buffer Overflow Attacks
28 november 2012 | 56 min
Play
Pause
Hal Aldridge, Not the Who but the What -- New applications of Hardware Identity
14 november 2012 | 42 min
Play
Pause
Jianneng Cao, Publishing Microdata with a Robust Privacy Guarantee
7 november 2012 | 54 min
Play
Pause
Vaibhav Garg, Risk perception of information security risks online
31 oktober 2012 | 61 min
Play
Pause
Mark Guido, Detecting Maliciousness Using Periodic Mobile Forensics
24 oktober 2012 | 54 min
Play
Pause
Edmund Jones, The Boeing Company
17 oktober 2012 | 56 min
Play
Pause
Chris Kanich, Understanding Spam Economics
10 oktober 2012 | 57 min
Play
Pause
William Enck, Defending Users Against Smartphone Apps: Techniques and Future Directions
3 oktober 2012 | 59 min
Play
Pause
Marc Brooks, Leveraging internal network traffic to detect malicious activity: Lessons learned
26 september 2012 | 44 min
Play
Pause
Jason Haas, Global Revocation for the Intersection Collision Warning Safety Application
19 september 2012 | 48 min
Play
Pause
Sharon Chand & Chad Whitman, Trends in cyber security consulting
12 september 2012 | 50 min
Play
Pause
Ed Lopez, The Inertia of Productivity
5 september 2012 | 57 min
Play
Pause
Lewis Shepherd, Challenges for R&D in the Security Field
29 augusti 2012 | 62 min
Play
Pause
Scott Andersen, The New Frontier, Welcome the Cloud Brokers
22 augusti 2012 | 56 min
Play
Pause
Christine Task, A Practical Beginners' Guide to Differential Privacy
25 april 2012 | 45 min
Play
Pause
Steve Battista, What firmware exists in your computer and how the fight for your systems will be below your operating system
18 april 2012 | 42 min
Play
Pause
Traian Truta, : K-Anonymity in Social Networks: A Clustering Approach
11 april 2012 | 53 min
Play
Pause
Nabeel Mohamed, Privacy preserving attribute based group key management
28 mars 2012 | 51 min
Play
Pause
Randall Brooks, Adding a Software Assurance Dimension to Supply Chain Practices
21 mars 2012 | 50 min
Play
Pause
Chenyun Dai, Privacy-Preserving Assessment of Location Data Trustworthiness
7 mars 2012 | 47 min
Play
Pause
Nishanth Chandran, Cryptographic Protocols in the Era of Cloud Computing
29 februari 2012 | 59 min
Play
Pause
Ben Calloni, Vulnerability Path and Assessment
22 februari 2012 | 53 min
Play
Pause
Simson Garfinkel, Forensic Carving of Network Packets with bulk_extractor and tcpflow
15 februari 2012 | 46 min
Play
Pause
Kelley Misata, Digital Citizenship: A Target's View of Security and Life Online
8 februari 2012 | 55 min
Play
Pause
George Vanecek, Is it Time to add Trust to the Future Internet/Web?
1 februari 2012 | 58 min
Play
Pause
Frank Tompa, A Flexible System for Access Control
25 januari 2012 | 56 min
Play
Pause
Salmin Sultana, Secure Provenance Transmission for Data Streams
18 januari 2012 | 39 min
Play
Pause
Stephen Elliott, Introduction to Biometrics
11 januari 2012 | 54 min
Play
Pause
Apu Kapadia, Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
30 november 2011 | 60 min
Play
Pause
Loukas Lazos, Jam me if you can: Mitigating the Impact of Inside Jammers
16 november 2011 | 57 min
Play
Pause
Zhongshu Gu, Process Implanting: A New Active Introspection Framework for Virtualization
9 november 2011 | 29 min
Play
Pause
Morgan Greenwood, SureView AMP, Active Malware Protection, detecting malware anti virus solutions miss
2 november 2011 | 52 min
Play
Pause
Sheila Becker, Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack
26 oktober 2011 | 29 min
Play
Pause
Julia M. Taylor, Victor Raskin, and Eugene H. Spafford, Ontological Semantic Technology Goes Phishing
19 oktober 2011 | 51 min
Play
Pause
Dan McWhorter and Steve Surdu, Enterprise-Wide Intrusions Involving Advanced Threats
12 oktober 2011 | 59 min
Play
Pause
Hal Aldridge, Trusted Computing and Security for Embedded Systems
5 oktober 2011 | 48 min
Play
Pause
Xukai Zou, Weighted Multiple Secret Sharing
28 september 2011 | 49 min
Play
Pause
Joe Leonard, Methods and Techniques for Protecting Data in Real Time on the Wire
21 september 2011 | 50 min
Play
Pause
David Zage, What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security
14 september 2011 | 44 min
Play
Pause
Steven Gianvecchio, Detecting Bots in Online Games using Human Observational Proofs
7 september 2011 | 51 min
Play
Pause
Tamir Tassa, Non-homogeneous Anonymizations
31 augusti 2011 | 57 min
Play
Pause
Scott Hollenbeck, Provisioning Protocol Challenges in an Era of gTLD Expansion
24 augusti 2011 | 59 min
Play
Pause
Eric Katz, Mobile Phones and Evidence Preservation
27 april 2011 | 49 min
Play
Pause
Jose Fernandez, Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet
20 april 2011 | 57 min
Play
Pause
Ronda R. Henning, FuzzyFusion™, an application architecture for multisource information fusion
13 april 2011 | 43 min
Play
Pause
Carter Bullard, Society, Law Enforcement and the Internet: Models for Give and Take
6 april 2011 | 71 min
Play
Pause
Kim Trieu, Wireless Technologies and how it relates to cyber security research
23 mars 2011 | 55 min
Play
Pause
Michael Schearer, Exploiting Banners for Fun and Profits
9 mars 2011 | 50 min
Play
Pause
Casey Deccio, Modeling DNS Security: Misconfiguration, Availability, and Visualization
2 mars 2011 | 49 min
Play
Pause
Jan Vitek, A couple of results about JavaScript
23 februari 2011 | 41 min
Play
Pause
Fariborz Farahmand, Understanding insiders: An analysis of risk-taking behavior *
9 februari 2011 | 43 min
Play
Pause
Torsten Braun, User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds
26 januari 2011 | 54 min
Play
Pause
Somesh Jha, Retrofitting Legacy Code for Security
19 januari 2011 | 51 min
Play
Pause
Fariborz Farahmand, Risk Perception and Trust in Cloud
12 januari 2011 | 37 min
Play
Pause
Matthew Hashim, Nudging the Digital Pirate: Behavioral Issues in the Piracy Context
1 december 2010 | 48 min
Play
Pause
Michael Kirkpatrick, Security Applications for Physically Unclonable Functions
17 november 2010 | 54 min
Play
Pause
Nikita Borisov, Detecting Coordinated Attacks with Traffic Analysis
10 november 2010 | 56 min
Play
Pause
Trent Jaeger, Tackling System-Wide Integrity
3 november 2010 | 60 min
Play
Pause
P. Madhusudan, The Role of Automata Theory in Software Verification
27 oktober 2010 | 58 min
Play
Pause
Sam King, Trust and Protection in the Illinois Browser Operating System
20 oktober 2010 | 50 min
Play
Pause
Alex Liu, Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems
13 oktober 2010 | 54 min
Play
Pause
Mihaela Vorvoreanu, Lorraine G. Kisselburgh, Global Study of Web 2.0 Use in Organizations
6 oktober 2010 | 51 min
Play
Pause
Sergey Panasyuk, Assured Processing through Obfuscation
29 september 2010 | 53 min
Play
Pause
Petros Mouchtaris, Security of Mobile Ad Hoc Networks (MANETs)
22 september 2010 | 52 min
Play
Pause
Xiaofeng Wang, Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses
15 september 2010 | 60 min
Play
Pause
Xeno Kovah, Rootkits
8 september 2010 | 61 min
Play
Pause
Ashish Kundu, Data in the Cloud: Authentication Without Leaking
1 september 2010 | min
Play
Pause
Cristina Nita-Rotaru, Secure Network Coding for Wireless Mesh Networks
25 augusti 2010 | 53 min
Play
Pause
Victor Raskin & Julia Taylor, Ontological Semantic Technology for Detecting Insider Threat and Social Engineering
28 april 2010 | 56 min
Play
Pause
Stephen Dill, The role of System Security Engineering in the engineering lifecycle
21 april 2010 | 58 min
Play
Pause
Christian Hammer, Security of JavaScript in a Browser Environment
14 april 2010 | 47 min
Play
Pause
Yvo Desmedt, 60 years of scientific research in cryptography: a reflection
7 april 2010 | 63 min
Play
Pause
David Bell, Everything I Needed to Know about Security, I Learned in 1974
31 mars 2010 | 61 min
Play
Pause
David Zage, A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems
24 mars 2010 | 41 min
Play
Pause
Pascal Meunier, Making of the CWE Top-25, 2010 Edition
10 mars 2010 | 53 min
Play
Pause
Wonjun Lee, Detection and protection from denial of service attacks in grids by accountability agents
3 mars 2010 | 54 min
Play
Pause
Kevin Hoffman, Ribbons, A Partially-Shared Memory Programming Model
24 februari 2010 | 50 min
Play
Pause
Hyo-Sang Lim, Provenance-based Data Trustworthiness Assessment in Data Streams
17 februari 2010 | 46 min
Play
Pause
Marcus Rogers, Dissecting Digital Data: Context & Meaning through Analytics
10 februari 2010 | 56 min
Play
Pause
Greg Stephens, Detecting Insider Theft of Trade Secrets
3 februari 2010 | 51 min
Play
Pause
Stephen Elliott, Applications of biometric technologies
20 januari 2010 | 50 min
Play
Pause
Eugene Spafford, Thinking Outside the Box
13 januari 2010 | 53 min
Play
Pause
Kelly Caine, Human Factors Approaches to Preserving Privacy
9 december 2009 | 54 min
Play
Pause
Andrew Scholnick, Cyber Security Trends and Disruptors
2 december 2009 | 57 min
Play
Pause
Gerome Miklau, Safely Analyzing Sensitive Network Data
18 november 2009 | 57 min
Play
Pause
Leszek Lilien, Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation.
11 november 2009 | 49 min
Play
Pause
Zahid Pervaiz, Multi-Policy Access Control for Healthcare using Policy Machine
4 november 2009 | 29 min
Play
Pause
Andre Koenig, Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges
28 oktober 2009 | 42 min
Play
Pause
Juhee Kwon, Information Security Management and IT Executives in a Top Management Team
21 oktober 2009 | 47 min
Play
Pause
Raquel Hill, PlugNPlay Trust for Embedded Communication Systems
14 oktober 2009 | 57 min
Play
Pause
Gary McGraw, Building Security In Maturity Model (BSIMM)
7 oktober 2009 | 51 min
Play
Pause
Richard Power, Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security
30 september 2009 | 60 min
Play
Pause
Rick Aldrich, The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw
23 september 2009 | 55 min
Play
Pause
Jerry Saulman, From Security Architecture to Implementation
16 september 2009 | 42 min
Play
Pause
Peter Mork, Database Assurance: Anomaly Detection for Relational Databases
9 september 2009 | 49 min
Play
Pause
Ragib Hasan, Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance
2 september 2009 | 51 min
Play
Pause
Ian Goldberg, Sphinx: A Compact and Provably Secure Mix Format
26 augusti 2009 | 54 min
Play
Pause
Joe Judge, Software Assurance: Motivation, Background, and Acquisition Pursuits
22 april 2009 | 57 min
Play
Pause
John D'Arcy, User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
15 april 2009 | 55 min
Play
Pause
Johann-Christoph Freytag, Privacy – from accessing databases to location based services
8 april 2009 | 50 min
Play
Pause
Melissa Dark, An Analysis of Data Breach Disclosure
1 april 2009 | 55 min
Play
Pause
, Rick Clark, Ontario Systems
25 mars 2009 | 50 min
Play
Pause
Arjan Durresi, Security for the Next Internet over Heterogeneous Environments
11 mars 2009 | 54 min
Play
Pause
Jeremy Rasmussen, The Best Defense is Information
4 mars 2009 | 47 min
Play
Pause
Mummoorthy Murugesan, Providing Privacy through Plausibly Deniable Search
25 februari 2009 | 39 min
Play
Pause
Charles Killian, Mace: Systems and Language Support for Building Correct, High-Performance Networked Services
18 februari 2009 | 49 min
Play
Pause
Mehmet Sahinoglu, Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory
11 februari 2009 | 52 min
Play
Pause
Cassio Goldschmidt, The Dark Side of Software Engineering and How to Defend Against It
4 februari 2009 | 45 min
Play
Pause
Ryan Riley, An Alternate Memory Architecture for Code Injection Prevention
28 januari 2009 | 38 min
Play
Pause
Paul Kidwell, A Rules Based Statistical Algorithm for Keystroke Detection
21 januari 2009 | 47 min
Play
Pause
Chris Clifton, Measuring Privacy: A Risk-Based Approach
14 januari 2009 | 53 min
Play
Pause
Ibrahim Baggili, Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step
10 december 2008 | 48 min
Play
Pause
Weidong Cui, Automatic Signature Generation for Unknown Vulnerabilities
3 december 2008 | 48 min
Play
Pause
Sylvia Osborn, The Role Graph Model and its Extensions
19 november 2008 | 49 min
Play
Pause
John Oritz, John Oritz, SRA International
12 november 2008 | 58 min
Play
Pause
Scott Orton, The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline
5 november 2008 | 59 min
Play
Pause
Kenji Takahashi, Trends in Identity Management
29 oktober 2008 | 52 min
Play
Pause
Federica Paci, Access Control and Resiliency for WS-BPEL
22 oktober 2008 | 31 min
Play
Pause
Adam Dugger, Signature Analysis Coupled With Slicing Analysis for the Validation of Software
15 oktober 2008 | 28 min
Play
Pause
Yuecel Karabulut, Measuring the Attack Surfaces of Enterprise Software Systems
8 oktober 2008 | 51 min
Play
Pause
Dave Keppler, Resilient Systems for Mission Assurance
1 oktober 2008 | 37 min
Play
Pause
Ashish Kamra, Responding to Anomalous Database Requests
24 september 2008 | 33 min
Play
Pause
Shimon Modi, Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors
17 september 2008 | 49 min
Play
Pause
Dennis Moreau, Virtualization: Resource Coupling and Security across the Stack
10 september 2008 | 47 min
Play
Pause
Gabriel Ghinita, Private Queries in Location Based Services: Anonymizers are not Necessary
3 september 2008 | 45 min
Play
Pause
Minaxi Gupta, Exploitable Redirects on the Web: Identification, Prevalence, and Defense
27 augusti 2008 | 55 min
Play
Pause
Jacob West, Static source code analysis
16 april 2008 | 51 min
Play
Pause
Jack Jones, Shifting focus: Aligning security with risk management
9 april 2008 | 61 min
Play
Pause
Hao Chen, Exploiting Opportunistic Scheduling in Cellular Data Networks
2 april 2008 | 49 min
Play
Pause
Sencun Zhu, Towards Event Source Location Privacy in Wireless Sensor Networks
26 mars 2008 | 52 min
Play
Pause
Daniel Hoffman, Hacking the Mobile Workforce
5 mars 2008 | 49 min
Play
Pause
Buzz Walsh, Managing Security Polarities
27 februari 2008 | 56 min
Play
Pause
Ta-Wei "David" Wang, Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents
20 februari 2008 | 44 min
Play
Pause
Myron Cramer, Beyond the Enclave: Evolving Concepts in Security Architectures
13 februari 2008 | 52 min
Play
Pause
Anand Singh, What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
30 januari 2008 | 50 min
Play
Pause
Edward W. Felten, Electronic Voting: Danger and Opportunity
23 januari 2008 | 54 min
Play
Pause
Paul Syverson & Roger Dingledine, Tor: Anonymous communications for government agencies, corporations, journalists... and you
16 januari 2008 | 64 min
Play
Pause
Eric Cole, Security in a Changing World
9 januari 2008 | 51 min
Play
Pause
Ventkat Venkatakrishnan, CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations
28 november 2007 | 40 min
Play
Pause
Steve Myers, Indiana University, Wireless Router Insecurity: The Next Crimeware Epidemic
14 november 2007 | 52 min
Play
Pause
Richard Thieme, Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing
7 november 2007 | 59 min
Play
Pause
Abhilasha Bhargav-Spantzel, Protocols and Systems for Privacy Preserving Protection of Digital Identity
31 oktober 2007 | 50 min
Play
Pause
George Heron, Secure Virtualization
24 oktober 2007 | 62 min
Play
Pause
Srdjan Capkun, From Securing Navigation Systems to Securing Wireless Communication
17 oktober 2007 | 51 min
Play
Pause
Neil Daswani, What Every Engineer Needs To Know About Security And Where To Learn It
10 oktober 2007 | 52 min
Play
Pause
David Ehinger, The Effect of Rootkits on the Corporate Environment
26 september 2007 | 40 min
Play
Pause
Jill Frisby, Protecting Data Privacy: A Practical Guide to Managing Risk
19 september 2007 | 36 min
Play
Pause
Ron Buskey, Security issues within embedded software development
12 september 2007 | 48 min
Play
Pause
Yvo Desmedt, Applying Recreational Mathematics to Secure Multiparty Computation
5 september 2007 | 50 min
Play
Pause
Klemens Boehm, Towards Effective and Efficient Behavior-based Trust Models
29 augusti 2007 | 52 min
Play
Pause
Bill Horne, Role Discovery
22 augusti 2007 | 49 min
Play
Pause
Umut Topkara, Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
25 april 2007 | 65 min
Play
Pause
Mercan Topkara, Hiding the Message Behind the Words: Advances in Natural Language Watermarking
18 april 2007 | 34 min
Play
Pause
Dr. Charles P. Pfleeger, Dumb Ideas in Computer Security
11 april 2007 | 51 min
Play
Pause
Dr. Albert M. K. Cheng, Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
28 mars 2007 | 51 min
Play
Pause
Dan Geer, A quant looks at the future
21 mars 2007 | 61 min
Play
Pause
Eugene Schultz, Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
7 mars 2007 | 52 min
Play
Pause
Bhavani Thuraisingham, Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
28 februari 2007 | 63 min
Play
Pause
Howard Schmidt, Cyber Security and the "NEW" world enterprise
21 februari 2007 | 52 min
Play
Pause
Stuart Shapiro, Scenario-Driven Construction of Enterprise Information Policy
7 februari 2007 | 58 min
Play
Pause
Chris Clifton, Mathematically Defining Privacy
31 januari 2007 | 50 min
Play
Pause
Wojciech Szpankowski, What is Information?
24 januari 2007 | 57 min
Play
Pause
Vipin Swarup, Research Challenges in Assured Information Sharing
17 januari 2007 | 43 min
Play
Pause
Virginia Rezmierski, Computer-Related Incidents: Factors Related to Cause and Prevention
10 januari 2007 | 53 min
Play
Pause
Marc Rogers, The Psychology of Computer Deviance: How it can assist in digital evidence analysis.
6 december 2006 | 57 min
Play
Pause
Dongyan Xu, OS-Level Taint Analysis for Malware Investigation and Defense
29 november 2006 | 58 min
Play
Pause
Richard Power, One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)
15 november 2006 | min
Play
Pause
David Zage, Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
8 november 2006 | 40 min
Play
Pause
Paula DeWitte, Developing an Operational Framework for Integrated System Security
1 november 2006 | 52 min
Play
Pause
Qihua Wang, Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
25 oktober 2006 | 40 min
Play
Pause
Nitin Khanna, Forensics Characterization of Printers and Image Capture devices
18 oktober 2006 | 43 min
Play
Pause
Nora Rifon, Network Security Begins at Home: Changing Consumer Behavior for i-Safety
11 oktober 2006 | 63 min
Play
Pause
Danfeng Yao, Verification of Integrity for Outsourced Content Publishing and Database Queries
4 oktober 2006 | 54 min
Play
Pause
Ravi Sandhu, The Secure Information Sharing Problem and Solution Approaches
27 september 2006 | 60 min
Play
Pause
Gene Kim, Prioritizing Processes and Controls for Effective and Measurable Security
20 september 2006 | 55 min
Play
Pause
Hyogon Kim, Real-Time Visualization of Network Attacks on High-Speed Links
13 september 2006 | 64 min
Play
Pause
Ed Finkler, A Multi-layered Approach to Web Application Defense
6 september 2006 | 47 min
Play
Pause
Sid Stamm, Invasive Browser Sniffing and Countermeasures
30 augusti 2006 | 42 min
Play
Pause
Ehab Al-Shaer, Ph.D., Toward Autonomic Security Policy Management
23 augusti 2006 | 35 min
Play
Pause
Virgil D. Gligor, On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks
26 april 2006 | 53 min
Play
Pause
John Black, Recent Attacks on MD5
19 april 2006 | 57 min
Play
Pause
David Carroll, Identity Management Strategies and Integration Perspectives
12 april 2006 | 68 min
Play
Pause
Dave Ford, Chaos,Complexity, Cybernetics and Therminator:
5 april 2006 | 50 min
Play
Pause
Minaxi Gupta, Spoofing-resistant Packet Routing for the Internet"
29 mars 2006 | 57 min
Play
Pause
Julie Earp, Privacy Policies in Web-based Healthcare
22 mars 2006 | 45 min
Play
Pause
Marina Blanton, Dynamic and Efficient Key Management for Access Hierarchies
8 mars 2006 | 49 min
Play
Pause
Rafae Bhatti, A Policy Engineering Framework for Federated Access Management
1 mars 2006 | 49 min
Play
Pause
Mike Burmester, Provable security in mobile ad hoc networks
15 februari 2006 | 54 min
Play
Pause
Brian Carrier, Categories of Digital Forensic Investigation Techniques
8 februari 2006 | 54 min
Play
Pause
Abhilasha Bhargav-Spantzel, Digital Identity Management and Theft Protection
1 februari 2006 | 51 min
Play
Pause
Paul Thompson, Semantic Attacks and Security
25 januari 2006 | 52 min
Play
Pause
Jean Camp, Net Trust: Identification Through Social Context
18 januari 2006 | 53 min
Play
Pause
Simson Garfinkel, Cross-Drive Forensic Analysis
11 januari 2006 | 49 min
Play
Pause
Jelena Mirkovic, Clouseau: A practical IP spoofing defense through route-based filtering
7 december 2005 | 54 min
Play
Pause
Stanislaw Jarecki, Secret Handshakes
30 november 2005 | 53 min
Play
Pause
Shouhuai Xu, Privacy-preserving Policy-driven Access Control with Mixed Credentials
16 november 2005 | 48 min
Play
Pause
Anna Squicciarini, Privacy and anonymity in Trust Negotiations".
9 november 2005 | 46 min
Play
Pause
Bryant G. Tow, A Demonstration in the Need for a Layered Security Model
26 oktober 2005 | 61 min
Play
Pause
Dr. Angelos D. Keromytis, Toward Self-healing Software
19 oktober 2005 | 51 min
Play
Pause
Dan Massey, Securing the Internet's Domain Name System
5 oktober 2005 | 45 min
Play
Pause
Ting Yu, A Framework for Identifying Compromised Nodes in Sensor Networks
21 september 2005 | 51 min
Play
Pause
Peter Bajcsy, Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur
14 september 2005 | 57 min
Play
Pause
Ed Finkler, Real World Web Application Security
7 september 2005 | 53 min
Play
Pause
Himanshu Khurana, Minimizing Trust Liabilities in Secure Group Messaging Infrastructures
31 augusti 2005 | 43 min
Play
Pause
Stephen Elliott, An Introduction to Biometric Technologies
24 augusti 2005 | 50 min
Play
Pause
Sheng Zhong, PrivacyEnhancing k-Anonymization of Customer Data
27 april 2005 | 78 min
Play
Pause
Marianne Winslett, Traust and PeerTrust2: Applying Trust Negotiation to Real Systems
20 april 2005 | 54 min
Play
Pause
Mohamed Shehab, Watermarking Relational Databases
13 april 2005 | 57 min
Play
Pause
Brian Carrier, Defining a Digital Forensic Investigation
6 april 2005 | 51 min
Play
Pause
Helen J. Wang, Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks
30 mars 2005 | 50 min
Play
Pause
Dr. Kate Cherry and Dr. Wendy Hamilton, Lockheed Martin
23 mars 2005 | 53 min
Play
Pause
David Evans, Where's the FEEB? Effectiveness of Instruction Set Randomization
9 mars 2005 | 50 min
Play
Pause
Florian Buchholz, Using process labels to obtain forensic and traceback information
2 mars 2005 | 47 min
Play
Pause
Jintai Ding, Perturbation of Multivariable Public-key Cryptosystems
23 februari 2005 | 43 min
Play
Pause
Wenke Lee, Architectural Considerations for Anomaly Detection
9 februari 2005 | 44 min
Play
Pause
Vitaly Shmatikov, Obfuscated Databases: Definitions and Constructions
2 februari 2005 | 50 min
Play
Pause
Keith Frikken, Hidden Access Control Policies with Hidden Credentials
19 januari 2005 | 46 min
Play
Pause
Cristina Nita-Rotaru, Survivable routing in wireless ad hoc networks
12 januari 2005 | 51 min
Play
Pause
Dennis Fetterly, Using Statistical Analysis to Locate Spam Web Pages
8 december 2004 | 36 min
Play
Pause
William Winsborough, Attribute-Based Access Control
1 december 2004 | 50 min
Play
Pause
Indrakshi Ray, An Anonymous Fair-Exchange E-Commerce Protocol
17 november 2004 | 42 min
Play
Pause
James Joshi, GTRBAC: A Generalized Temporal Role Based Access Control Model
10 november 2004 | 47 min
Play
Pause
Abe Singer, Towards Mining Syslog Data
3 november 2004 | 44 min
Play
Pause
Ari Takanen, Robustness testing - black-box testing for software security
27 oktober 2004 | 50 min
Play
Pause
Dan Thomsen, Information Flow Analysis in Security Enhanced Linux
13 oktober 2004 | 55 min
Play
Pause
Gail-Joon Ahn, Secure Information Sharing within a Collaborative Environment
15 september 2004 | 53 min
Play
Pause
Jason Crampton, Administrative Scope and Role-Based Administration
8 september 2004 | 51 min
Play
Pause
Sam Wagstaff, Cryptanalysis of Diffie-Hellman and Pohlig-Hellman
23 januari 2002 | 51 min
Play
Pause
Sam Wagstaff, Information Theory
22 augusti 2001 | 51 min
Play
Pause
Gary McGraw, Building Secure Software
10 januari 2001 | 61 min
Play
Pause
Peter Stephenson, Investigating Computer Security Incidents
8 november 2000 | 62 min
Play
Pause
Wenke Lee, Developing Data Mining Techniques for Intrusion Detection: A Progress Report
11 oktober 2000 | 60 min
Play
Pause
Richard Stotts, Jerome Webb & Matthew Beebe, Richard Stotts, Jerome Webb & Matthew Beebe
4 oktober 2000 | 60 min
Play
Pause
John Richardson, Evolving the Internet
20 september 2000 | 62 min
Play
Pause
Eugene Spafford, The Challenge of Secure Software
13 september 2000 | 65 min
Play
Pause
Jens Palsberg, Static Checking of Interrupt-Driven Software
6 september 2000 | 54 min
Play
Pause
Pascal Meunier, The IRDB Project: An Incident Response Database For Gathering Cost And Incidence Information On Types of Security Events
30 augusti 2000 | 57 min
Play
Pause
John Steven Reel, The Future of Information Security Technologies
23 augusti 2000 | 44 min
Play
Pause
Rick Davis, The Holy Grail of E-Business Risk Management: Creating and Sustaining the Insurable Standard for E-Business Security and Assurance
28 april 2000 | 68 min
Play
Pause
Michael G. Fleming & Victor Maconachy, Information Assurance Challenges for the 21st Century
21 april 2000 | 47 min
Play
Pause
Terran Lane, Machine Learning Techniques for Anomaly Detection in Computer Security
7 april 2000 | 58 min
Play
Pause
Padgett Peterson, Implications of Mobile Code on Microsoft Platforms
31 mars 2000 | 64 min
Play
Pause
Judy Hochberg, Automatic identification of classified documents
25 februari 2000 | 61 min
Play
Pause
Clay Shields, Tracing Denial-of-Service Attacks; or why we may never know who attacked Yahoo et. al.
18 februari 2000 | 59 min
Play
Pause
Gerald Thomas, Commercial High-Resolution Satellite Imagery Polic
11 februari 2000 | 53 min
Play
Pause
Victor Raskin, NLP for IAS: Overview and Implementations
4 februari 2000 | 50 min
Play
Pause
Gene Kim, Open Source Issues and Opportunities for Tripwire
21 januari 2000 | 58 min
Play
Pause
Wenliang Du & Mahesh Tripunitara, Security Relevancy Analysis on the Registry of Windows NT 4.0 (for Wenliang Du)
19 november 1999 | 60 min
Play
Pause
Mahesh Tripunitara, Thwarting Denial of Service Attacks against Communication Protocols with Backward Compatible Changes: A Case Study
19 november 1999 | 60 min
Play
Pause
Donn Parker, Information Security, a Folk Art in Need of an Upgrade
12 november 1999 | 69 min
Play
Pause
Michael Santarcangelo, eInfrastructure Security
5 november 1999 | 71 min
Play
Pause
James R. C. Hansen, Computer Forensics Examinations in the Consulting Arena
29 oktober 1999 | 68 min
Play
Pause
David Aucsmith, Balancing Big Brother
15 oktober 1999 | 102 min
Play
Pause
Edward J. Delp, Image and Video Watermarking: An Overview
10 september 1999 | 66 min
Play
Pause
Gene Spafford, Twelve Challenges in Information Security Research
3 september 1999 | 76 min
Play
Pause
Clay Shields, KHIP - A Scalable Protocol for Secure Multicast Routing
27 augusti 1999 | 46 min
Ladda fler
Minimera
00:00
-00:00
15
Tillbaka 15 sekunder
Play
Pause
15
Framåt 15 sekunder
15
Tillbaka 15 sekunder
Play
Pause
15
Framåt 15 sekunder
Expandera spelare
Stäng spelare
00:00
-00:00